The use of ip address blocks with default interfaces in a router is described herein. According to one embodiment, an exemplary method includes in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses, and advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses. Other methods and apparatuses are also described.
|
10. A method performed by a network element, comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statical preassigned ip addresses.
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses;
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses;
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider;
determining whether all ip addresses of the first block of ip addresses have been released; and
releasing the first block of ip addresses back to the ip address provider if all ip addresses of the first block of ip addresses have been released.
20. A machine-readable storage medium having excitable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigned the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider seperated from a pool of staticallv preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses;
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses;
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses;
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider;
determining whether all ip addresses of the first block of ip addresses have been released; and
releasing the first block of ip addresses back to the ip address provider if all ip addresses of the first block of ip addresses have been released.
1. A method performed by a network clement, comprising:
in response to a request for a first ip address received from a first client at an interface of the network clement over an access network, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only if there is no statically preassigned ip address corresponding to particular interface available; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
11. A machine-readable storage medium having executable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only there is no statically preassigned ip address corresponding to particular interface available; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
21. A network element, comprising:
a processor; and
a memory coupled to the processor to store instructions, when executed by the processor, cause the processor to
in response to a request for a first ip address received from a first client at an interface of the network element. assume the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only if there is no statically preassigned ip address corresponding to particular interface available, and
advertise reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
7. A method performed by a network element, comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, determining whether there is at least one ip address available from a pool of statically preassigned ip addresses;
determining whether a second block of ip addresses has been previously dynamically allocated from the ip address provider in response to a previous request for an ip address if there is no ip address available from the pool of statically preassigned ip addresses; and
assigning an ip address from the second block of ip addresses previously allocated if the second block of ip addresses exists and contains at least one ip address available;
dynamically allocating a first block of ip addresses from an ip address provider if there is no ip address available from the pool of statically preassigned ip addresses and there is no ip address available from the second block;
assigning the first client an ip address from the first block of ip addresses dynamically allocated from tile ip address provider separated from a pool of statically preassigned ip addresses;
advertising reachability information in a network with respect to the first block of the ip address dynamically allocated from the ip address provider, such that other entities of the network arc aware of the first block of the ip addresses.
17. A machine-readable storage medium having executable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, determing whether there is at least one ip address available from a pool of statically preassigned ip addresses;
determining whether a second block of ip addresses has been previously dynamically allocated from the ip address provider provider to a previous request for an ip address if there is no ip address available from the pool of statically preassigned ip addresses
assigning an ip address from the second block of ip addresses previously allocated if the second block of ip addresses exists and contains at least one ip address available;
dynamically allocating a first block of ip addresses from an ip address provider if there is no ip address available from the pool of statically preassigned ip addresses and there is no ip address available from the second block;
assigning the first client an ip address from the first block of ip addresses dynamically allocated from the ip address provider separated from a pool of statically preassigned ip addresses; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
2. The method of
4. The method of
determining whether there is at least one ip address available from the pool of statically preassigned ip addresses; and
dynamically allocating the first block of ip addresses from the ip address provider if there is no ip address available from the pool of statically preassigned ip addresses.
5. The method of
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses; and
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider.
6. The method of
receiving a request for allocating a third ip address from a third client; and
reassigning the second ip address from the first block of ip addresses to the third client without invoking the ip address provider.
8. The method of
9. The method of
12. The machine-readable storage medium of
13. The machine-readable storage medium of
14. The machine-readable storage medium of
determining whether there is at least one ip address available from the pool of statically preassigned ip addresses; and
dynamically allocating the first block of ip addresses from the ip address provider if there is no ip address available from the pool of statically preassigned ip addresses.
15. The machine-readable storage medium of
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses; and
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider.
16. The machine-readable storage medium of
receiving a request for allocating a third ip address from a third client; and
reassigning the second ip address from the first block of ip addresses to the third client without invoking the ip address provider.
18. The machine-readable storage medium of
19. The machine-readable storage medium of
23. The network element of
|
This application claims the benefit of U.S. Provisional Application No. 60/516,200, filed Oct. 31, 2003, which is hereby incorporated by reference.
The present invention relates generally to communications. More particularly, this invention relates to a use of IP address blocks with default interfaces in a router.
In the field of communications, the need for high-speed transmission of data, including video and audio, has continued to increase. Moreover, there has been an increase in the selection of services by which users can connect to a network, such as the Internet. Specifically, Internet Service Providers (ISPs) may allow for connectivity to the Internet through lower-speed connections at different rates, such as 56 kilobits/second, by employing a Plain Old Telephone Service (POTS) line. Other choices for connection, which are at higher speeds, into a network can include Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL) service, and cable modem service over a Radio Frequency (RF) cable line. Further, other types of content providers may enable a subscriber to receive different types of media, such as a video stream, audio stream, etc.
In a typical DSL network, a network element supports a wide variety of features to facilitate the management, allocation and distribution of IP addresses. Normally, the subscriber profile can be configured locally on the network element or can be retrieved from a remote server (e.g., a RADIUS (remote access dial in user server)). A subscriber profile determines how an IP address (and optionally the associated route for the subscriber LAN) would be provided to a certain subscriber. Similarly, a cable modem user uses a DHCP server to allocate IP addresses for the clients.
Traditionally, the IP addresses provided to the subscribers must exist within the IP address/subnet “boundary” of an interface. That is, an interface must “contain” or “subtend” the IP addresses that are being provided to subscribers. The network element only has to advertise (e.g., perform network broadcast) for the interfaces (not each IP address assigned to each interface). However, since those IP addresses are preprovisioned in relatively large blocks, it is not uncommon for them to be unused IP addresses (an IP address assigned a subnet that is not assigned to a subscriber due to a lack of demand cannot be used by another router). This is unfortunate because IP addresses can be a scarce resource.
When the IP addresses are not adequate, a default interface, also referred to as interface of last resort, may be used to provide additional IP addresses. In the default interface configuration, the IP addresses provided to the subscribers do not have to exist within IP address/subnet boundary of an interface. That is, the IP addresses provided to the subscribers are decoupled from the interface(s) definition. This allows a single IP subnet to be fully allocated and to be shared across multiple routers. However, the network element has to perform network broadcast for each IP address handed out as an interface of last resort. As a result, large amount of network traffic is generated. In addition, the IP address provider (e.g., DHCP or RADIUS) has to handle each individual IP address request as a last resort, which leads to a heavy load on the IP address provider.
Typically, there are two major approaches to provide IP addresses to the subscribers, traditional approach and a default interface (interface of last resort) approach.
Traditional Approach
This approach is more appropriate for a centralized aggregation model (e.g., BRAS). Utilizing the traditional approach, the following methods are supported on a network element to manage/allocate IP addresses to the subscribers:
In all cases above, an IP interface is configured on the network element that “contains” the IP addresses that are being assigned to the subscribers. For example, following interface may be defined on the network element, or if multiple virtual routers are supported, in a given context (a virtual router or a physical router):
This approach is more commonly used in a more distributed aggregation model. It has also been traditionally used for PPP encapsulated subscribers in a Remote Access dial-up environment. The default interface feature of the network element would provide the capability to decouple IP address assigned to a session from the interface IP address/subnet mask definition. The application of this feature to PPP-encapsulated subscribers would be equivalent to the PPP-default interface feature on the network element. Default Interfaces are applicable to both PPP-encapsulated and CLIPs-encapsulated subscribers.
The default interface for PPP subscribers may be configured to provide PPP sessions an interface to which they can bind in case no other valid interface exists (e.g., a valid interface is one whose IP subnet “contains” the IP address of the subscriber) on a system. Hence also the name: “interface of last resort”. Normally, a PPP session that cannot bind to an interface (due to lack of an interface with a valid matching IP range) simply fails the binding. With the use of default interfaces, this PPP session will instead bind to the interface designated as a “default” interface. The default interface in this instance acts as an interface of last resort. By using such a design, there is no requirement to have all subscribers terminated on a single router interface be assigned addresses from a common IP subnet. This allows for an IP subnet to be shared across many router devices. This allows the service provider to more fully utilize the IP address space allocated to them, as there are no wasted addresses due to allocation inefficiencies (however, IP addresses assigned to a subnet interface may still go unused depending on demand). It also allows the service provider to build redundancy into the access network, provided there is a means to reroute subscriber sessions to a standby router. The default interface works in a similar manner as described above except that the server involved here would be the DHCP server.
The use of IP address blocks with default interfaces in a router is described herein. According to one embodiment, an exemplary method includes in response to a request for a first IP address received from a first client at an interface of the network element, assigning the first client an IP address from a first block of IP addresses dynamically allocated from an IP address provider separated from a pool of statically preassigned IP addresses, if there is no IP address remained unassigned in the pool of statically preassigned IP addresses, and advertising reachability information in a network with respect to the first block of the IP address dynamically allocated from the IP address provider, such that other entities of the network are aware of the first block of the IP addresses. Other methods and apparatuses are also described.
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
The use of IP address blocks with default interfaces in a router is described herein. In the following description, numerous details are set forth to provide a more thorough explanation of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent finite sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The invention also relates to one or more different apparatuses for performing the operations herein. This apparatus may be specially constructed for the required purposes (e.g., software, hardware, and/or firmware, etc.), or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. The computer readable medium can be physical/storage media or transmission media instructions of such software, firmware, and computer programs may be stored in a machine readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards or transmission media such as: electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, etc.) or any type of media suitable for storing electronic instructions.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
An Exemplary Network
Referring to
Note that the subscriber's address has no corresponding interfaces that would normally be considered a “match”. With this configuration, a subscriber can be terminated on any of the three network element units: A, B or C with an address in any of the 10.0.0.1, 10.0.1.1 and 10.0.2.1 subnets. All subscribers bound to the default interface appear to unit D to be directly connected to the backbone network.
Once binding is successful, the backbone router needs to be able to send packets to the newly bound subscriber. One way is to distribute host routes via an Interior Gateway Protocol, such as OSPF or IS-IS, or an exterior gateway protocol such as BGP. A second way is to use proxy-ARP in conjunction with secondary addressing on the aggregation router.
The first method involving the use of routing protocols to distribute host routes. In this model, an interface is flagged as ‘default’ and all subscribers with no matching valid interfaces bind to this default interface. The network element can then be configured to distribute all the reachability information in the form of host routes in a routing protocol. The backbone learns the existence and location of each of the hosts by means of the routing protocol. Routes to hosts that bind to the default interface are treated as subscriber routes. Injecting these routes into the routing protocol requires the administrator to configure redistribution of subscriber routes. One of the advantages of this approach is that there is no requirement to run Proxy-ARP and the administrator has full Layer 3 visibility into each flow at all times. The individual PPP session's IP address will appear as a host entry in the routing table where the session terminates and can be redistributed into a dynamic routing protocol at that point. Proper network design would have a common upstream router summarize these host routes prior to advertising the routes into the backbone.
For the second method, in addition to the default designation, proxy ARP may be configured on another interface to provide IP reachability. Referring to
Method 1 above involving the use of routing protocols to distribute host routes is the more commonly used approach to deal with default interfaces. This creates a problem in that a large number of host routes (/32s) have to be carried in the routing protocol. This number could be as many as 500,000 routes in a single region. While sometimes this level of scaling is not a problem on the network element, it could cause problems on other routers in the network. Reducing the number of routes carried by the routing protocol is highly desirable. A second issue with routing is that subscribers logging on and off the network results in frequent routing protocol updates which effects the backbone routing convergence and quality. Devices on the network other than the network element may also have issues related to the handling of frequent route updates and with having to frequently rerun their algorithms to achieve convergence.
According to one embodiment, one approach to address this problem is via the use of address microblocks when performing address allocation on an IP address provider or supplier, such as, for example, a RADIUS or DHCP server, according to one embodiment.
In one embodiment, the RADIUS or DHCP server (whichever is being used to perform address allocation, depending on the encapsulation in use) allocates addresses to the router in microblocks. For example, a RADIUS server capable of supporting address microblocking will perform at least one of the following operations upon receiving a receiving an authentication request from a certain router:
This causes each router to be assigned microblocks of IP addresses. In one embodiment, the subscriber routes assigned in this manner can be tagged as a special route type, such as, for example, subscriber-summary routes. The special route type can be used in enforcing policy decisions when distributing routes. When these types of routes are distributed via the routing protocol, the summary route with the specified microblocking prefix length is advertised. If a router does not understand the microblocking RADIUS VSA, it should ignore the attribute and distribute /32 addresses. The router will also black-hole all packets addressed to addresses in the micro-block that have yet to be assigned to a subscriber. Thus for example, using a microblock size of 8 could reduce the number of routes distributed by a router via the routing protocol by as much as a factor of 8.
In the case of DHCP and CLIPs subscribers, according to one embodiment, the relay-agent or DHCP proxy may send an Option 82 field indicating a microblocking capability when relaying a request. In a particular embodiment, this would include a sub-option of “microblocking” with prefix-length of zero. The DHCP server upon receipt of this Option 82 field (if it supports microblocking) may fill in the sub-option with the correct prefix-length. If the relay-agent does not send this sub-option or option 82, then the DHCP server does not need to send this information in its response.
When there is a requirement to support changes in block size on the DHCP or RADIUS server, according to one embodiment, intelligence may be built into fragment address blocks only as the block of addresses is entirely freed up, either via DHCP lease expiration or via subscribers logging off and terminating their sessions.
If there is no more preassigned IP address available, network element 201 determines whether there is at least one IP address in an existing microblock of IP address, which previously dynamically allocated to network element 201 as a default interface. If there is at least one IP address from an existing microblock IP address pool 209, at block 304, network element 201 assigns an IP address out of microblock IP address pool 209. If there is no more IP address available from microblock IP address pool 209 or there is no microblock IP address ever allocated, at block 303, network element 201 may send a request to IP address provider 206 via backbone for a microblock of IP addresses and assign one of the IP addresses in the newly allocated block to the client. Thereafter, at block 305, network element 201 may advertise the reachability information with respect to the block of IP addresses.
It will be appreciated that address microblocking and default interfaces can also be used together with the subscriber binding capability on the network element to provision business customers via unnumbered interfaces on the network element. The RADIUS server can be used to inform the network element about the subscribers IP networks via the Framed-IP-Route attribute. These routes are then installed in the route table as being reachable via the unnumbered default interface.
In one embodiment, when IP address provider 206 allocates a microblock of IP addresses to network element 201, the microblock of IP addresses may be defined to include a start address and the length of the microblock.
Referring to
For example, referring to
Thus, the use of default interfaces allows for a simple provisioning model where scarce IP addresses can be fully utilized. Further the use of microblocking on RADIUS and DHCP servers in conjunction with support on the router greatly reduces the impact of using such default interfaces on systems and the routing protocols. Address microblocking also reduces the amount of state that has to be carried in routing protocols as well as the frequency of updates. All these factors result in a more scalable, flexible and stable network.
Thus, the use of IP address blocks with default interfaces in a router has been described herein. In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope of the invention as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
Shen, Naiming, Seshadri, Kishore K.
Patent | Priority | Assignee | Title |
10051078, | Jun 12 2007 | ICONTROL NETWORKS, INC | WiFi-to-serial encapsulation in systems |
10056761, | May 02 2011 | ICONTROL NETWORKS, INC | Power and data solution for remote low-power devices |
10062245, | Mar 30 2010 | iControl Networks, Inc. | Cross-client sensor user interface in an integrated security network |
10062273, | Sep 28 2010 | ICONTROL NETWORKS, INC | Integrated security system with parallel processing architecture |
10078958, | Dec 17 2010 | ICONTROL NETWORKS, INC | Method and system for logging security event data |
10079839, | Jun 12 2007 | ICONTROL NETWORKS, INC | Activation of gateway device |
10091014, | Sep 23 2011 | ICONTROL NETWORKS, INC | Integrated security network with security alarm signaling system |
10117191, | Mar 15 2013 | iControl Networks, Inc. | Adaptive power modulation |
10127801, | Sep 28 2010 | ICONTROL NETWORKS, INC | Integrated security system with parallel processing architecture |
10127802, | Sep 28 2010 | ICONTROL NETWORKS, INC | Integrated security system with parallel processing architecture |
10140840, | Apr 23 2007 | iControl Networks, Inc. | Method and system for providing alternate network access |
10142166, | Mar 16 2004 | iControl Networks, Inc. | Takeover of security network |
10142392, | Jan 24 2007 | ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC | Methods and systems for improved system performance |
10142394, | Jun 12 2007 | iControl Networks, Inc. | Generating risk profile using data of home monitoring and security system |
10156831, | Mar 16 2005 | iControl Networks, Inc. | Automation system with mobile interface |
10156959, | Mar 16 2005 | ICONTROL NETWORKS, INC | Cross-client sensor user interface in an integrated security network |
10200504, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols over internet protocol (IP) networks |
10212128, | Jun 12 2007 | ICONTROL NETWORKS, INC | Forming a security network including integrated security system components and network devices |
10223903, | Sep 28 2010 | ICONTROL NETWORKS, INC | Integrated security system with parallel processing architecture |
10225314, | Jan 24 2007 | ICONTROL NETWORKS, INC | Methods and systems for improved system performance |
10237237, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10237806, | Apr 29 2010 | ICONTROL NETWORKS, INC | Activation of a home automation controller |
10257364, | Aug 25 2008 | ICONTROL NETWORKS, INC | Security system with networked touchscreen and gateway |
10275999, | Apr 29 2010 | ICONTROL NETWORKS, INC | Server-based notification of alarm event subsequent to communication failure with armed security system |
10277609, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10313303, | Jun 12 2007 | ICONTROL NETWORKS, INC | Forming a security network including integrated security system components and network devices |
10332363, | Apr 30 2009 | iControl Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
10339791, | Jun 12 2007 | ICONTROL NETWORKS, INC | Security network integrated with premise security system |
10348575, | Jun 27 2013 | ICONTROL NETWORKS, INC | Control system user interface |
10365810, | Jun 27 2013 | ICONTROL NETWORKS, INC | Control system user interface |
10375253, | Aug 25 2008 | ICONTROL NETWORKS, INC | Security system with networked touchscreen and gateway |
10380871, | Mar 16 2005 | ICONTROL NETWORKS, INC | Control system user interface |
10382452, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10389736, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10423309, | Jun 12 2007 | iControl Networks, Inc. | Device integration framework |
10444964, | Jun 12 2007 | ICONTROL NETWORKS, INC | Control system user interface |
10447491, | Mar 16 2004 | iControl Networks, Inc. | Premises system management using status signal |
10498830, | Jun 12 2007 | iControl Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
10522026, | Aug 11 2008 | ICONTROL NETWORKS, INC | Automation system user interface with three-dimensional display |
10523689, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols over internet protocol (IP) networks |
10530839, | Aug 11 2008 | ICONTROL NETWORKS, INC | Integrated cloud system with lightweight gateway for premises automation |
10559193, | Feb 01 2002 | Comcast Cable Communications, LLC | Premises management systems |
10574060, | Apr 30 2010 | iControl Networks, Inc. | Intelligent power supply and transformation for user devices |
10616075, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10616244, | Jun 12 2006 | iControl Networks, Inc. | Activation of gateway device |
10645347, | Aug 09 2013 | ICN ACQUISITION, LLC | System, method and apparatus for remote monitoring |
10657794, | Mar 26 2010 | ICONTROL NETWORKS, INC | Security, monitoring and automation controller access and use of legacy security control panel information |
10659179, | Mar 15 2013 | iControl Networks, Inc. | Adaptive power modulation |
10666523, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
10672254, | Apr 23 2007 | iControl Networks, Inc. | Method and system for providing alternate network access |
10674428, | Apr 30 2009 | ICONTROL NETWORKS, INC | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
10691295, | Mar 16 2004 | iControl Networks, Inc. | User interface in a premises network |
10692356, | Mar 16 2004 | iControl Networks, Inc. | Control system user interface |
10721087, | Mar 16 2005 | ICONTROL NETWORKS, INC | Method for networked touchscreen with integrated interfaces |
10735249, | Mar 16 2004 | iControl Networks, Inc. | Management of a security system at a premises |
10741057, | Dec 17 2010 | iControl Networks, Inc. | Method and system for processing security event data |
10747216, | Feb 28 2007 | ICONTROL NETWORKS, INC | Method and system for communicating with and controlling an alarm system from a remote server |
10754304, | Mar 16 2004 | iControl Networks, Inc. | Automation system with mobile interface |
10764248, | Mar 16 2004 | iControl Networks, Inc. | Forming a security network including integrated security system components and network devices |
10771582, | Mar 04 2018 | NETSKRT SYSTEMS, INC | System and apparatus for intelligently caching data based on predictable schedules of mobile transportation environments |
10778800, | Mar 04 2018 | NETSKRT SYSTEMS, INC | System and apparatus for propagating content throughout a network using a mobile environment |
10785319, | Jun 12 2006 | ICONTROL NETWORKS, INC | IP device discovery systems and methods |
10796557, | Mar 16 2004 | iControl Networks, Inc. | Automation system user interface with three-dimensional display |
10813034, | Apr 30 2009 | ICONTROL NETWORKS, INC | Method, system and apparatus for management of applications for an SMA controller |
10841381, | Mar 16 2005 | iControl Networks, Inc. | Security system with networked touchscreen |
10841668, | Aug 09 2013 | ICN ACQUISITION, LLC | System, method and apparatus for remote monitoring |
10880394, | Mar 04 2018 | NETSKRT SYSTEMS, INC , | Transparent cache system and method for transparently caching multimedia content from multiple content providers |
10890881, | Mar 16 2004 | iControl Networks, Inc. | Premises management networking |
10904351, | Mar 04 2018 | NETSKRT SYSTEMS, INC | System and apparatus for temporally and spatially aggregating connectivity to a mobile cache |
10911559, | Mar 04 2018 | NETSKRT SYSTEMS, INC | System and apparatus for implementing a high speed link between a mobile cache and an edge cache |
10930136, | Mar 16 2005 | iControl Networks, Inc. | Premise management systems and methods |
10942552, | Mar 24 2015 | iControl Networks, Inc. | Integrated security system with parallel processing architecture |
10965615, | Mar 30 2012 | NOKIA SOLUTIONS AND NETWORKS OY | Centralized IP address management for distributed gateways |
10979389, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
10992784, | Mar 16 2004 | ICONTROL NETWORKS, INC | Communication protocols over internet protocol (IP) networks |
10999254, | Mar 16 2005 | iControl Networks, Inc. | System for data routing in networks |
11032242, | Mar 16 2004 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
11037433, | Mar 16 2004 | iControl Networks, Inc. | Management of a security system at a premises |
11043112, | Mar 16 2004 | iControl Networks, Inc. | Integrated security system with parallel processing architecture |
11082395, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
11089122, | Jun 12 2007 | ICONTROL NETWORKS, INC | Controlling data routing among networks |
11113950, | Mar 16 2005 | ICONTROL NETWORKS, INC | Gateway integrated with premises security system |
11128728, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Method and apparatus for walled garden with a mobile content distribution network |
11129084, | Apr 30 2009 | iControl Networks, Inc. | Notification of event subsequent to communication failure with security system |
11132888, | Apr 23 2007 | iControl Networks, Inc. | Method and system for providing alternate network access |
11140583, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Transforming video manifests to enable efficient media distribution |
11146637, | Mar 03 2014 | ICONTROL NETWORKS, INC | Media content management |
11153266, | Mar 16 2004 | iControl Networks, Inc. | Gateway registry methods and systems |
11159484, | Mar 16 2004 | iControl Networks, Inc. | Forming a security network including integrated security system components and network devices |
11175793, | Mar 16 2004 | iControl Networks, Inc. | User interface in a premises network |
11182060, | Mar 16 2004 | iControl Networks, Inc. | Networked touchscreen with integrated interfaces |
11184322, | Mar 16 2005 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
11190578, | Aug 11 2008 | ICONTROL NETWORKS, INC | Integrated cloud system with lightweight gateway for premises automation |
11194320, | Feb 28 2007 | iControl Networks, Inc. | Method and system for managing communication connectivity |
11201755, | Mar 16 2004 | iControl Networks, Inc. | Premises system management using status signal |
11212192, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11218878, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
11223998, | Mar 26 2010 | iControl Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
11237714, | Jun 12 2007 | Control Networks, Inc. | Control system user interface |
11240059, | Dec 20 2010 | iControl Networks, Inc. | Defining and implementing sensor triggered response rules |
11244545, | Mar 16 2004 | iControl Networks, Inc. | Cross-client sensor user interface in an integrated security network |
11252253, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Caching aggregate content based on limited cache interaction |
11258625, | Aug 11 2008 | ICONTROL NETWORKS, INC | Mobile premises automation platform |
11277465, | Mar 16 2004 | iControl Networks, Inc. | Generating risk profile using data of home monitoring and security system |
11284331, | Apr 29 2010 | ICONTROL NETWORKS, INC | Server-based notification of alarm event subsequent to communication failure with armed security system |
11296950, | Jun 27 2013 | iControl Networks, Inc. | Control system user interface |
11310199, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
11316753, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11316958, | Aug 11 2008 | ICONTROL NETWORKS, INC | Virtual device systems and methods |
11323536, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Apparatus and method for trans-border movement of streaming media content |
11341840, | Dec 17 2010 | iControl Networks, Inc. | Method and system for processing security event data |
11343380, | Mar 16 2004 | iControl Networks, Inc. | Premises system automation |
11356530, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Leveraging mobile environment to distribute cache data |
11356926, | Apr 30 2009 | iControl Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
11367340, | Mar 16 2005 | iControl Networks, Inc. | Premise management systems and methods |
11368327, | Aug 11 2008 | ICONTROL NETWORKS, INC | Integrated cloud system for premises automation |
11368429, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
11375036, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Method and apparatus to prioritize and schedule the distribution of learned content |
11378922, | Mar 16 2004 | iControl Networks, Inc. | Automation system with mobile interface |
11388252, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Micro-cache method and apparatus for a mobile environment with variable connectivity |
11394795, | Mar 04 2018 | NETSKRT SYSTEMS, INC. | System and apparatus for implementing a high speed link between a mobile cache and an edge cache |
11398147, | Sep 28 2010 | iControl Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
11399058, | Mar 22 2018 | NETSKRT SYSTEMS, INC | Immutable ledger method and apparatus for managing the distribution of content |
11405463, | Mar 03 2014 | iControl Networks, Inc. | Media content management |
11410531, | Mar 16 2004 | iControl Networks, Inc. | Automation system user interface with three-dimensional display |
11412027, | Jan 24 2007 | iControl Networks, Inc. | Methods and systems for data communication |
11418518, | Jun 12 2006 | iControl Networks, Inc. | Activation of gateway device |
11418572, | Jan 24 2007 | iControl Networks, Inc. | Methods and systems for improved system performance |
11423756, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
11424980, | Mar 16 2005 | iControl Networks, Inc. | Forming a security network including integrated security system components |
11432055, | Aug 09 2013 | ICN ACQUISITION, LLC | System, method and apparatus for remote monitoring |
11438553, | Aug 09 2013 | ICN ACQUISITION, LLC | System, method and apparatus for remote monitoring |
11449012, | Mar 16 2004 | iControl Networks, Inc. | Premises management networking |
11451409, | Mar 16 2005 | iControl Networks, Inc. | Security network integrating security system and network devices |
11489812, | Mar 16 2004 | iControl Networks, Inc. | Forming a security network including integrated security system components and network devices |
11496568, | Mar 16 2005 | iControl Networks, Inc. | Security system with networked touchscreen |
11537186, | Mar 16 2004 | iControl Networks, Inc. | Integrated security system with parallel processing architecture |
11553399, | Apr 30 2009 | iControl Networks, Inc. | Custom content for premises management |
11553579, | Mar 14 2013 | iControl Networks, Inc. | Three-way switch |
11582065, | Jun 12 2007 | ICONTROL NETWORKS, INC | Systems and methods for device communication |
11588787, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
11595364, | Mar 16 2005 | iControl Networks, Inc. | System for data routing in networks |
11601397, | Mar 16 2004 | iControl Networks, Inc. | Premises management configuration and control |
11601810, | Jun 12 2007 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
11601865, | Apr 30 2009 | iControl Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
11611568, | Jan 24 2008 | iControl Networks, Inc. | Communication protocols over internet protocol (IP) networks |
11615697, | Mar 16 2005 | iControl Networks, Inc. | Premise management systems and methods |
11616659, | Aug 11 2008 | iControl Networks, Inc. | Integrated cloud system for premises automation |
11625008, | Mar 16 2004 | iControl Networks, Inc. | Premises management networking |
11625161, | Jun 12 2007 | iControl Networks, Inc. | Control system user interface |
11626006, | Mar 16 2004 | iControl Networks, Inc. | Management of a security system at a premises |
11632308, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11641391, | Aug 11 2008 | iControl Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
11646907, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11656667, | Mar 16 2004 | iControl Networks, Inc. | Integrated security system with parallel processing architecture |
11663902, | Apr 23 2007 | iControl Networks, Inc. | Method and system for providing alternate network access |
11665617, | Apr 30 2009 | iControl Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
11677577, | Mar 16 2004 | iControl Networks, Inc. | Premises system management using status signal |
11700142, | Mar 16 2005 | iControl Networks, Inc. | Security network integrating security system and network devices |
11706045, | Mar 16 2005 | iControl Networks, Inc. | Modular electronic display platform |
11706279, | Jan 24 2007 | iControl Networks, Inc. | Methods and systems for data communication |
11711234, | Aug 11 2008 | iControl Networks, Inc. | Integrated cloud system for premises automation |
11722806, | Aug 09 2013 | ICN ACQUISITION, LLC | System, method and apparatus for remote monitoring |
11722896, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11729255, | Aug 11 2008 | iControl Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
11736563, | Mar 22 2018 | NETSKRT SYSTEMS, INC. | Immutable ledger method and apparatus for managing the distribution of content |
11750414, | Dec 16 2010 | ICONTROL NETWORKS, INC | Bidirectional security sensor communication for a premises security system |
11757834, | Mar 16 2004 | iControl Networks, Inc. | Communication protocols in integrated systems |
11758026, | Aug 11 2008 | iControl Networks, Inc. | Virtual device systems and methods |
11778534, | Apr 30 2009 | iControl Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
11782394, | Mar 16 2004 | iControl Networks, Inc. | Automation system with mobile interface |
11792036, | Aug 11 2008 | iControl Networks, Inc. | Mobile premises automation platform |
11792330, | Mar 16 2005 | iControl Networks, Inc. | Communication and automation in a premises management system |
11809174, | Feb 28 2007 | iControl Networks, Inc. | Method and system for managing communication connectivity |
11810445, | Mar 16 2004 | iControl Networks, Inc. | Cross-client sensor user interface in an integrated security network |
11811845, | Mar 16 2004 | iControl Networks, Inc. | Communication protocols over internet protocol (IP) networks |
11815969, | Aug 10 2007 | iControl Networks, Inc. | Integrated security system with parallel processing architecture |
11816323, | Jun 25 2008 | iControl Networks, Inc. | Automation system user interface |
11824675, | Mar 16 2005 | iControl Networks, Inc. | Networked touchscreen with integrated interfaces |
11831462, | Aug 24 2007 | iControl Networks, Inc. | Controlling data routing in premises management systems |
11856502, | Apr 30 2009 | ICONTROL NETWORKS, INC | Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises |
11893874, | Mar 16 2004 | iControl Networks, Inc. | Networked touchscreen with integrated interfaces |
11894986, | Jun 12 2007 | iControl Networks, Inc. | Communication protocols in integrated systems |
11900790, | Sep 28 2010 | iControl Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
11916870, | Mar 16 2004 | iControl Networks, Inc. | Gateway registry methods and systems |
11916928, | Jan 24 2008 | iControl Networks, Inc. | Communication protocols over internet protocol (IP) networks |
11943301, | Mar 03 2014 | iControl Networks, Inc. | Media content management |
11962672, | Aug 11 2008 | iControl Networks, Inc. | Virtual device systems and methods |
11991306, | Mar 16 2004 | iControl Networks, Inc. | Premises system automation |
11997584, | Apr 30 2009 | iControl Networks, Inc. | Activation of a home automation controller |
12063220, | Mar 16 2004 | ICONTROL NETWORKS, INC | Communication protocols in integrated systems |
12063221, | Jun 12 2006 | iControl Networks, Inc. | Activation of gateway device |
12081635, | Mar 04 2018 | NETSKRT SYSTEMS, INC. | System and apparatus for implementing a high speed link between a mobile cache and an edge cache |
12088425, | Dec 16 2010 | iControl Networks, Inc. | Bidirectional security sensor communication for a premises security system |
12100287, | Dec 17 2010 | iControl Networks, Inc. | Method and system for processing security event data |
12120171, | Jan 24 2007 | iControl Networks, Inc. | Methods and systems for data communication |
12127095, | Apr 30 2009 | iControl Networks, Inc. | Custom content for premises management |
12184443, | Jun 12 2007 | iControl Networks, Inc. | Controlling data routing among networks |
12184907, | Jun 04 2021 | NETSKRT SYSTEMS, INC | Method and apparatus for multicast control of a live video stream |
7747751, | Dec 30 2005 | Siemens Aktiengesellschaft | IP address allocation method |
7911341, | Jan 24 2007 | ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC | Method for defining and implementing alarm/notification by exception |
8082333, | Nov 10 2008 | Cisco Technology, Inc. | DHCP proxy for static host |
8214496, | Jun 12 2007 | iControl Networks, Inc. | Gateway registry methods and systems |
8271684, | Feb 06 2007 | Samsung Electronics Co., Ltd. | Electronic device, management server, and control method thereof for checking an IP address |
8327017, | Mar 12 2008 | United Services Automobile Association (USAA) | Systems and methods for an autonomous intranet |
8335842, | Mar 16 2004 | ICN ACQUISITION, LLC | Premises management networking |
8473619, | Mar 16 2005 | ICN ACQUISITION, LLC | Security network integrated with premise security system |
8478844, | Mar 16 2005 | ICN ACQUISITION, LLC | Forming a security network including integrated security system components and network devices |
8478871, | Jun 12 2006 | ICN ACQUISITION, LLC | Gateway registry methods and systems |
8533798, | Jun 19 2006 | AUTHPOINT LLC | Method and system for controlling access to networks |
8612591, | Mar 16 2005 | ICN ACQUISITION, LLC | Security system with networked touchscreen |
8635350, | Jun 12 2006 | ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC | IP device discovery systems and methods |
8713132, | Mar 16 2005 | ICONTROL NETWORKS, INC | Device for data routing in networks |
8819178, | Mar 16 2005 | ICN ACQUISITION, LLC | Controlling data routing in integrated security systems |
8825871, | Mar 16 2005 | ICONTROL NETWORKS, INC | Controlling data routing among networks |
8825904, | Sep 23 2009 | ZTE Corporation | Method, apparatus, system for address management |
8988221, | Mar 16 2005 | ICONTROL NETWORKS, INC | Integrated security system with parallel processing architecture |
8996665, | Mar 16 2005 | ICONTROL NETWORKS, INC | Takeover processes in security network integrated with premise security system |
9059863, | Mar 16 2005 | ICONTROL NETWORKS, INC | Method for data routing in networks |
9144143, | Apr 30 2010 | ICONTROL NETWORKS, INC | Power and data solution for remote low-power devices |
9172553, | Mar 16 2005 | ICN ACQUISITION, LLC | Security system with networked touchscreen and gateway |
9191228, | Mar 16 2005 | ICONTROL NETWORKS, INC | Cross-client sensor user interface in an integrated security network |
9287727, | Mar 15 2013 | ICONTROL NETWORKS, INC | Temporal voltage adaptive lithium battery charger |
9306809, | Jun 12 2007 | ICONTROL NETWORKS, INC | Security system with networked touchscreen |
9349276, | Sep 28 2010 | ICONTROL NETWORKS, INC | Automated reporting of account and sensor information |
9412248, | Feb 28 2007 | ICONTROL NETWORKS, INC | Security, monitoring and automation controller access and use of legacy security control panel information |
9426720, | Apr 30 2009 | ICONTROL NETWORKS, INC | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
9450776, | Mar 16 2005 | ICN ACQUISITION, LLC | Forming a security network including integrated security system components |
9510065, | Apr 23 2007 | ICONTROL NETWORKS, INC | Method and system for automatically providing alternate network access for telecommunications |
9531593, | Mar 16 2005 | iControl Networks, Inc. | Takeover processes in security network integrated with premise security system |
9609003, | Jun 12 2007 | ICONTROL NETWORKS, INC | Generating risk profile using data of home monitoring and security system |
9621408, | Jun 12 2007 | ICONTROL NETWORKS, INC | Gateway registry methods and systems |
9628440, | Nov 12 2008 | ICONTROL NETWORKS, INC | Takeover processes in security network integrated with premise security system |
9729342, | Dec 20 2010 | ICONTROL NETWORKS, INC | Defining and implementing sensor triggered response rules |
9867143, | Mar 15 2013 | ICONTROL NETWORKS, INC | Adaptive Power Modulation |
9928975, | Mar 14 2013 | ICONTROL NETWORKS, INC | Three-way switch |
ER5277, | |||
ER5799, |
Patent | Priority | Assignee | Title |
6944167, | Oct 24 2000 | T-MOBILE INNOVATIONS LLC | Method and apparatus for dynamic allocation of private address space based upon domain name service queries |
20040139226, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 27 2004 | SHEN, NAIMING | REDBACK NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015866 | /0671 | |
Sep 27 2004 | SESHADRI, KISHORE K | REDBACK NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015866 | /0671 | |
Sep 29 2004 | Redback Networks, Inc. | (assignment on the face of the patent) | / | |||
Jan 25 2007 | REDBACK NETWORKS INC | Ericsson AB | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 024002 | /0363 |
Date | Maintenance Fee Events |
Mar 30 2012 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Mar 30 2016 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 18 2020 | REM: Maintenance Fee Reminder Mailed. |
Nov 02 2020 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Sep 30 2011 | 4 years fee payment window open |
Mar 30 2012 | 6 months grace period start (w surcharge) |
Sep 30 2012 | patent expiry (for year 4) |
Sep 30 2014 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 30 2015 | 8 years fee payment window open |
Mar 30 2016 | 6 months grace period start (w surcharge) |
Sep 30 2016 | patent expiry (for year 8) |
Sep 30 2018 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 30 2019 | 12 years fee payment window open |
Mar 30 2020 | 6 months grace period start (w surcharge) |
Sep 30 2020 | patent expiry (for year 12) |
Sep 30 2022 | 2 years to revive unintentionally abandoned end. (for year 12) |